Sign In  |  Register  |  About Pleasanton  |  Contact Us

Pleasanton, CA
September 01, 2020 1:32pm
7-Day Forecast | Traffic
  • Search Hotels in Pleasanton

  • CHECK-IN:
  • CHECK-OUT:
  • ROOMS:

How to protect your wealth online

By: Issuewire
hacking data

While many are having their data hacked, Altoo is ensuring their clients' wealth remains protected although it's online accessible.

Zug, Switzerland Apr 26, 2023 (Issuewire.com) - An estimated 30,000 websites are hacked globally daily, with 43% of all cyberattacks targeting small businesses. Such is the scale of the issue that a cyberattack occurs every 39 seconds and costs US$10.5 trillion each year*.

Altoo is an advanced wealth aggregation management system that empowers wealthy individuals and their families to consolidate and interact intuitively with their total wealth. The software company is working to change the tide of cybersecurity threats with industry-leading systems and monitoring. Amongst its many pioneering features include three-factor authentication, while the platform is only accessible via a pre-determined IP address and only once specialist software has been downloaded.

"The cybercrime industry is on a steep rise, as many studies show, and it is now a multi-billion market," says Stefan Thiel CTO of Altoo.

He adds: "With the Internet of Things, and an ever-increasing number of devices reachable by internet, from everywhere by everyone, the potential threats become even more manifold. Organisations must implement even more robust cybersecurity measures to prevent sophisticated attacks."

Re-imagining online wealth management security

Altoo features highly encrypted communication and storage tools, a very fine granular and sophisticated authorization mechanism, intrusion detection, and advanced security vulnerability testing, to name just a few of its many security features.

"Our platform is operated in a professional Tier3 data centre in Switzerland with all the strict measures that protect physical access to our hardware," Thiel explains. "Additionally, our platform is produced and resides only in Switzerland, and we hire only people based in Switzerland, ensuring a higher level of cyberattack protection."

He adds: "We monitor thousands of emails daily and have a lot of phishing emails, of which 98% are caught by our email filter. A few sophisticated emails that are able to bypass our systems are often announced to ITOps [IT Operations] by employees or seen by ITOps, and these then help us improve our email filter rules.

"We also have brute force attacks to our platforms (https/443) that try brute force URL scanning. The source IPs of such URL scans are banned after only a very few tries to block extensive misusage."

Ransom protection is a key part of protecting a system from cyber attacks.

"Ransom is usually also about stealing data and threatening to publish confidential data. That is why we have very sensitive data only in an encrypted manner. Segmentation adds further hurdles for any ransom to spread. We have multiple network segments protected by an internal firewall. Additionally, we use concepts such as "jump hosts" (hardened virtual desktops without access to the internet) to protect sensitive infrastructure.

"Additionally, we use different OSs tools in different segments, which adds further hurdles for any ransom malware to spread. We also have different communication services in different separated locations in case of a [partially] successful attack."

Protecting yourself online

Thiel recommends that all online users follow a general checklist to protect themselves from cybersecurity attacks. These include: 

-     Having endpoint device security installed

-     Not installing unnecessary applications, especially ones that are for fun

-     Exercise caution around freeware - one must understand the motivation/how somebody earns his money; often, freeware is free because the user, his data or behaviour, is the product they make money with.

-     Stay updated - most serious products will update themselves regularly.

-     Don't fall for any promises - most promises are so primitive, for example, you won't win a lottery if you did not participate. You won't inherit from unknown people. The sad thing is that people are still fooled by these phishing emails.

-     Finally, keep offline backups of important data.

Thiel also recommends that those at the forefront of preventing cybersecurity stay updated with the latest threats by attending leading industry events. However, he cautions that they should be attended only by those with a full understanding of the industry. 

"Security is a major money-making business working with the fears of people that do not understand cybersecurity," Thiel explains.

"Everything labelled security implicitly has a much higher price. Such conferences provide a very good product and service overview if you know and understand the threats in your situation and your protection needs. One of the key things that security providers do not tell you is that adding products and services to your dispositive is adding attack points (threat vectors) as well, which you must consider. A good example of this was the 2020 cyberattack on SolarWinds when more than 18,000 customers installed malicious updates," he adds.

*Source: zippia.com/advice/cybersecurity-statistics

 

Performance net wealth screenshot from Altooprotect your dataReport total change screenshot from Altoow

Media Contact

Altoo


*****@relevance.digital

https://altoo.io/

Source :https://altoo.io/

This article was originally published by IssueWire. Read the original article here.

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.
 
 
Photography by Christophe Tomatis
Copyright © 2010-2020 Pleasanton.com & California Media Partners, LLC. All rights reserved.